118
Using policies to manage security
The types of security policies
The types of security policies
Your security policies define how the protection technologies protect your
computers from known and unknown threats.
You use several different types of security policies to manage your network
security. Most types of policies are automatically created during the installation.
You can use the default policies or you can customize policies to suit your specific
environment.
See
Performing tasks that are common to all security policies"
Security policy types
Table 10-1
Policy type
Virus and Spyware
Protection policy
Firewall policy
Description
The Virus and Spyware Protection policy provides the
following protection:
Detects, removes, and repairs the side effects of virus
and security risks by using signatures.
Detects the threats in the files that users try to download
by using reputation data from Download Insight.
Detect the applications that exhibit suspicious behavior
by using SONAR heuristics and reputation data.
The Virus and Spyware Protection policy finds behavior
anomalies through its SONAR technology. For legacy
clients, it finds behavior anomalies through TruScan
proactive threat scans.
Note:
Download Insight and SONAR technology are
available only on Windows clients.
See
Managing scans on client computers"
The Firewall policy provides the following protection:
Blocks the unauthorized users from accessing the
computers and networks that connect to the Internet.
Detects the attacks by hackers.
Eliminates the unwanted sources of network traffic.
Note:
Firewall policies can be applied only to Windows
clients.
See
Managing firewall protection"
on page 119.
on page 136.
on page 205.
Need help?
Do you have a question about the 20032623 - Endpoint Protection Small Business Edition and is the answer not in the manual?